Hewlett-Packard (HP) is unique in this EMA Radar in its ability to combine two threads – a single analytic overlay as embodied in its Service Health Analyzer (SHA) product, and a broader suite solution optimized for HP to participate in all three use cases here with maximum functional impact. This is not entirely a black-and-white situation, as SHA does leverage and currently largely depends on integration with HP Business Service Management 9.1, which is itself a suite. But SHA can assimilate other third-party sources, checks out brilliantly in early-phase deployments in terms of time-to-value and analytic power, and is the lead reason for HP’s strong Value Leader showing in technical performance management.

In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.

Are dev and test constraints holding back your digital transformation?
Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing.
Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back.
At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.

By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.

When evaluating and migrating to Windows 10, it is critical to understand the use cases and benefits of various deployment choices. Should you:
• Refresh or upgrade your existing deployments?
• Migrate your physical endpoints to VDI?
• Extend published remote apps to your Windows endpoints?
We look at these use cases and introduce SysTrack - a tool that provides recommendations on an optimal Windows 10 deployment approach your organizations should take.

Mobile is undoubtedly changing both our personal and professional lives. Customer service organizations should decide on a strategy to bridge the gap between mobile behavior and customer service. This requires a strategic review of value drivers, combined with a tactical search for relevant use cases.
Don’t fall in the “we need an app for everything” trap — some users need big screens, some users don’t. Some need a rich experience, others just need basic functions. Your strategy must take all of these dynamics into consideration.

Enterprises tend not to view project management as a holistic process. Much like the disparate systems they have in place, they see a disparate collection of issues.
They typically look to solve specific pain points with single applications. Rather than migrate an entire enterprise to a new system, they are looking to manage a problem spot and have it flow into a specific component (e.g., cost, human capital leverage, or how demand is driven) as needed. In many cases, however, the pain points are symptoms of a larger issue, and to remove them the situation must be viewed in the context of the full project life cycle. Oracle Project Portfolio Management (PPM) Cloud, part of the integrated suite that is Oracle ERP Cloud, not only does this, but it’s also built with the user in mind… solving the PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.

In evaluating UEBA solutions’ ability to detect, prioritize, and respond, it is important to understand the full potential of data sciencedriven analytics. Organizations should ask their vendors if they can support the following Top 12 UEBA use cases, and most importantly, demand that the vendor demonstrate this support within the POC or pilot.

To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending.
To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.

Since when did budgeting become a process that companies dread? Just say the word “budget,” and you’ll elicit at least a few groans or eyerolls from teams outside of finance. It’s daunting: the weight of the next few years rests on a couple of forecasts, financial projections and line-item lists. As a result, cross-functional teams are under a lot of stress to ensure that their cases and arguments are heard. In some ways, the budgeting process almost feels combative.

Semiconductors run and connect today’s technology-driven world, powering all the electronic systems and products around us. Critical to communication, entertainment, work, medical diagnoses, travel, socializing, and making new discoveries, these specialized chips are ubiquitous. And chip designs grow ever more sophisticated in order to power new generations of devices, computers, the Internet, and the cloud. To enable new applications and use cases – like the Internet of Things – semiconductor vendors have continually pushed the boundaries of their designs to accommodate new fabrication processes that make chips smaller, more power efficient (to make personal devices last longer), and able to pack more gates into smaller dies (to make them more powerful).

While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.

This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.

This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.

Artificial intelligence (AI) and machine learning are redefining business analytics. But for
HR, use cases can be much more complex. Learn five key steps to build a strong foundation for
answering HCM questions today and position yourself to use AI in HR going forward.

Download Transaction-Centric vs. Infrastructure Centric Application Performance Management from TRAC Research to examine the major differences between the two approaches, the pros and cons of both in difference use cases, and finally which technology better fits your organization.

This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.

To select the group video conferencing systems that best address their requirements, customers should do the following:
1) Understand the types of spaces to be video- (or collaboration-) enabled and the common use
cases for each.
2) Review the requirements described in the tables above.
3) Meet with various solution vendors, ask for details about their group video offerings, and see
how closely those systems address the needs of each type of space.
Download to learn more.

This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.

Web conferencing can be used in many meeting scenarios, from internal collaboration to presentations, training and large events. IT leaders must examine the use cases that will drive their requirements for a portfolio of online meeting technologies.

In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed.
OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON.
This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications.
This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.

The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.

One way to shift testing practices earlier in your software lifecycle is by using multi-layered visual models to specify requirements in a way where all ambiguity is inherently removed. With unambiguous and complete requirements, developers introduce less defects into their code and manual test cases, automated test scripts and required test data can be automatically generated based on the requirement, without manual intervention.

The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey.
It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line.
The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.